Skip to main content

Home/ Digiteen/ Group items matching "your" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
18More

Internet Collaboration: Good, Bad, and Downright Ugly - 0 views

  • Tips for Effective Internet Collaboration
  • in order to make the most of an often bad situation, I offer eight tips for effective Internet collaboration. These tips were developed based on my experiences over the past
  • While
  • ...14 more annotations...
  • c communication re
  • I believe strongly that electroni
  • mains a poor substitute for face-to
  • -face communication, I also realize that some collaborative projects would n
  • t be practical without it. So,
  • ew years with groups that follow them and
  • th groups
  • with groups that don't.
  • 1. Appoint a single leader or a small group of leaders who are responsible for making sure everything runs smoothly. These leaders need not have any decision-making authority, but they should have administrative responsibilities such as: keeping debates on topic, setting and enforcing deadlines, maintaining the group mailing list, and keeping a group archive. They should also be willing to serve as a resource and answer questions from group members so that these questions need not clog the mailing list. These leaders must be diligent about carrying out their responsibilities and should seek assistance should they find themselves over burdened. 2. Establish a no flame policy for your group. Flame wars are destructive to just about any collaborative effort. Group leaders should make a point of not involving themselves in flame wars, even if they are the target of a flame. They should also gently remind other group members of the policy. Some groups may wish to give a leader the authority to remove group members who repeatedly engage in flame wars. 3. Establish a policy of open communication between all group members. Members should keep everyone informed of the progress they have made i
  • n carrying out their responsibilities. If someone is havin
  • Establish
  • trouble completing a task they volunteered to do (due to lack of time, lack of expertise, or any other reason), they should inform other group members. If some group members communicate privately about a group matter, they should inform the rest of the group about the outcome of their discussion (being careful to say ``we recommend'' rather than ``we decided'' unless the group has given them the authority to make the decision). It is especially important for anyone in a leadership position to communicate with other members and make sure that the members are communicating with each other. 4. Establish a mission statement and set of operating procedures for your group. Depending on the size of your group and the duration of your project, this may be a short list of ground rules or a formal constitution. You should have guidelines and rules that cover the responsibilities of the leaders, the responsibilities of members, procedures for making decisions (including what to do in the event of a deadlock), procedures for appointing and expelling group members or leaders, and procedures for changing these rules. When working on a long-term, open ended project it is best to keep the ground rules somewhat flexible so that unanticipated ideas are not precluded and new group members don't feel stifled by a framework established by members long-retired. 5. Whenever a new and likely controversial topic is introduced to the group, have people respond to the original poster rather than to the entire mailing list. Then have the original poster collect all the responses into a single message (and if possible prepare an executive summary) and send that back to the group. You may want to repeat this for several rounds of discussion before opening the topic up for general debate. The idea here is to put all the issues on the table at once so that people don't start a debate before they have all the facts and a general understanding of the concerns of other group members. 6. Hold periodic virtual meetings. This can be done through a conference call, audio or video online conferencing software, an online chat room, or even an agreement that everyone will be online and checking their email at a specified time. Any of these formats should allow for a more or less synchronous debate followed, if necessary, by a vote. 7. If your group has trouble making decisions and is unable to get group members together for a virtual meeting frequently enough, try resorting to an electronic equivalent of Roberts Rules of Order in which the rules of debate are spelled out in great detail. (The nice thing about Robert's Rules is that they have been well established and thus groups can agree to adopt them without arguing over what they should be. Adopting a set of electronic rules for debate may be tricky if your group has to write these rules from scratch. But you may be able to get your group members to agree t
  • o adopt a set of rules written by
  • subcommittee or a neutral party.) Such rules might include the maximum amount of time allowed for a debate before a vote must be taken, the amount of time members have to submit their votes, and the maximum number of words or separate email messages a member may send to the mailing list on a particular topic. I see this mostly as a method of last resort, and I don't recommend writing this into the group's constitution or ground rules unless you've tried it and found it to be effective. 8. Try to find ways for as many of your group members as possible to meet in person. Ideally you would fly everyone to a central location for a group retreat. But financial concerns often don't allow for such luxuries, so do the best you can. Encourage group members to visit their geographically closest neighbors in the group and to meet other members at conferences or when traveling. The more group members get to know each other, the easier collaboration will be. If possible, try to get the entire group together at the beginning of the project and at the end of the project (or for a lengthy project, after every major phase of the project has been completed). Getting the entire group together at the beginning will help the group establish a common sense of direction. Meeting at the end or after the completion of a major phase will provide a sense of closure and an opportunity for group members to evaluate what they have done.
  •  
    This is some collaboration tips.
4More

digiteen - Digital Rights and Responsibilities - 0 views

  • Those freedoms extended to everyone in a digital world - electronic responsibility for actions and deeds AUP (inside and outside of school) Use online material ethically (citing sources) Report cyberbullies and threats
  • ocially Rights and Responsibilities has a lot of influence over us, and our daily life. Everything we do in our online lives or even just online we have to think if it is within our rights or whether we have the responsibilty to do something. For many of us we found this so hard to do because our rights and responsibilities online are soo very different to them offline, which is why it is importtant for children to incorporate these ideas into their daily lives and at a young enough age for them to adapt to them quickly.
  • ...1 more annotation...
  • You need to be aware of which sites people can gain access to your profile and without your permission. Some examples are: Facebook, MySpace. Beware of sites where people can change your password just by knowing your user name. An itunes account is a good example of where this is the case. If your not sure, test it out for your self by clicking on "forgotten your password?" and seeing whether the new pass word is accepted. If you become a victim of cyberbullying, make sure you contact people responsible for the site. If you join a forum, make should you read through the rules and regulations for members. This can be especially important if the forum is a special interest forum where you may get asked to leave if you post "off topic" mails. Use the Internet respectfully: don't post embarrassing pictures of your friends onto sites without their permission!
2More

Parents should control use of technology - 1 views

  • 1. Power down at mealtimes. This means no television, computers or texting. This is the time to really connect with each other without the technological distractions that can be so overwhelming throughout the day. 2. No computers in kids' bedrooms until at least high school. Please trust me on this one. The risks just aren't worth it. Keep computers in public areas of your house, and regularly monitor their usage. 3. Limit or eliminate television viewing on school nights. You'll be amazed at the impact this will have on your family. Kids play games, become creative and interact with us and their siblings. 4. No social media networks until at least high school, and supervise their use. Many kids just don't have the impulse control to adequately control this technology, and the effects on them and others can be substantial. 5. Supervise cell phone use, including texting. You need to be guided by the maturity of your child, but irresponsible behavior should result in increased supervision. 6. Learn about technology. Don't be afraid of texting, video-conferencing, iPads, or Facebook. They are fun and great ways to stay connected with your kids.
  •  
    Tips for parents that think their kids are spending too much time with technology
1More

Texting While Driving - 0 views

  •  
    Texting and driving is a major cause of wrecks around the world, especially in teenagers. We have become so addicted to our phones that we can't even put them down long enough to drive to the grocery to store or out to eat with some friends. Driving requires your entire attention, but when your looking at your phone, you are not aware of your surroundings. Quote: "Driving is an activity that requires full concentration and composing, reading, and sending text messages will compromise the driver's concentration."- from the website
2More

Statistics - 1 views

  •  
    Facebook is one the most commonly used social networking sites. There are more than 800 million users and more than 70 languages used. More than 350 of Facebook's active users has access to the site on their phone and more than 475 mobile operators work to promote Facebook mobile products. Quote: "More than 50% of our active users log on to Facebook in any given day." -from this website
  •  
    These statistics show that over 800 million people actively use Facebook! Its kind of scary to think that your child has the possibility of being friend-ed by any of them?! Be an aware parent and watch over your child's online activity, but do it form afar! Don't go get on their page! Make your own! That's taking away trust and we are entering a digital age! You need to be on the internet learning just as much as your children do! Quotes: Facts about Facebook: More than 800 million active user More than 900 million objects that people interact with (pages, groups, events and community pages) More than 70 languages available on the site On average, people on Facebook install apps more than 20 million times every day More than 350 million active users currently access Facebook through their mobile devices
19More

digiteen2008 - Digital Etiquette - 3 views

  • Good etiquette is shown by having a proper education, manners and a sense of tact.
  • Etiquette mainly appears when someone has guests, meets with other people, or during meals.
  • Etiquette: Key terms Etiquette: rules governing socially acceptable behavior. Propriety: correct or appropriate behavior. Manners: a polite or well bred social behavior or habits Proper: marked by suitability or rightness or appropriateness. Education: the activities of educating or instructing; activities that impart knowledge or skill. Respect: an attitude of admiration or esteem. Civilized: having a high state of culture and development both social and technological. Social: living together or enjoying life in communities or organized groups. Tact: the ability to speak without offending others. Polite: showing regard for others in manners, speech, behavior. Impression: mental picture: a clear and telling mental image. Cleanliness: the habit of keeping free of superficial imperfections, diligence in keeping clean. Sophisticated: having or appealing to those having worldly knowledge and refinement. Society: an extended social group having a distinctive cultural and economic organization.
  • ...14 more annotations...
  • Digital Etiquette 1. Here is some tips that you should follow when talking online, texting, or emailing: 2. Say Hello before you start talking. It’s polite and it can make somebody happy knowing that somebody is nice enough to say hello. 3. Try to avoid replying “Sure”. A person will go crazy trying to figure out “Sure” what? Also, depending on who you are talking to online, the person may know little of your language and might not understand what you are saying, so be patient. 4. Avoid trailing off. If you stop responding to somebody all of the sudden they might think you’re ignoring them. If you have to go and do something say “BRB” or “one sec”. It will calm any worries, which the person has, who you are communicating to. 5. Don’t post people’s photos without their permission. Somebody might have a religion where they're not allowed to have they're pictures online. 6. Accept differences. Everybody has different beliefs. Don’t make fun of somebody’s religion or country because people can really get offended about what you say. 7. Talk about things that are appropriate. Chat rooms are for anyone who wants to talk to new people. One inappropriate comment can ruin it for everyone. You should always be aware to whom you are talking to and if they ask you to do anything which you feel uncomfortable about then tell an adult immediately so then the problem won't get out of hands. 8. Say bye before you leave the person whether its in person or online. You could seriously hurt somebody’s feelings if you just stop talking to them. 9. Be careful the way you type something. What you write can sound very different than what you mean. Read your writing before you press send. It could save you from an embarrassing situation. 10. Avoid writing in all capital letters. It looks like you're shouting. Wouldn't you think I was shouting if you saw this, DON'T WRITE IN ALL CAPITAL LETTERS.
  • Access Communication Literacy Student Environment Security and Safety Etiquette Rights and Responsibilities Student Life Outside Commerce Law Health and Wellness Class Actions American School of Madrid Spain Anand Vidya Vihar India Aspengrove School Canada Badshah Faisal Islami Institute Bangladesh La Grange USA Pahartali Girls High School Bangladesh Rani Bilashmoni Govt. Boys High School Bangladesh Troy Middle School USA Qatar Academy Qatar Wedderburn College Australia Westwood Schools USA Information Social & Ethical Issues Rubrics Teachers Template sj32 · My Wikis · · My Account · Help · Sign Out · Digital Etiquette page Details and TagsPrint PDF Backlinks Source Delete Rename Redirect Permissions Lock discussion (39) history notify me Details last edit Friday, 12:46 pm by kcaise - 124 revisions Tags none Type a tag name. Press comma or enter to add another. Cancel Table of ContentsDigital Etiquette 1. Overview/Description of the various aspects of the topic. Elementary Aged Students Middle/ High School Aged Students Email Etiquette: BE A SPORT, AND KEEP IT SHORT: NON MIND READERS FRIENDLY, PLEASE!: graTipos and.grammar! can caus cauz ishueezz? (typos and grammar... can cause issues!) BUISNESS FOR BUSYNESS!!! BE PLASTIC-ON-THE-SCREEN-CLEAR!!! A
  • Digital Etiquette or netiquette is a basic set of rules you should follow to make the internet a better place for other people and yourself.
  • When you instant message, chat, or email someone over the internet, that person can't tell if your just joking because they can't see your face. Don't say stuff over the internet that can be taken the wrong way or can hurt someones feelings
  • The internet takes over some peoples lives and people can get brain washed so easily when on the computer. Hacking other computers, using bad language, downloading illegally, and plagiarism are examples of having bad or no etiquette when it comes to the internet.
  • Etiquette is a set of rules dealing with exterior form
  • Middle/ High School Aged Students Teenagers these days are only on the internet to chat with their friends they know, or to look at cool videos or pictures.Myspace and Facebook are easy ways for teenagers to get access to the internet. These two websites have caused a lot of controversies over the internet because some teenagers will put bad pictures on the internet of themselves or other people. Every once in a while fights will occur between people who are trying to make each other look bad. It gives them a bad reputation and it ruins friendships all over the world. I just think that if teenagers would act mature then a lot of these things would not happen.
  • Online plagiarism is where internet users copy or use part of your or someone else's work. It is definitely not acceptable and is becoming a major issue. People need to have the right to place information on the internet knowing that it will not be copied for other people's work. Plagiarism is illegal but people still don't get the message. Plagiarism really could start major problems like people not writing the truth on the internet or making up information just to teach people a lesson. If someone is going to copy other people's work really they are better off handing the work in late or not at all. Using people's ideas is okay if you give them recognition or asked them. Plagiarism is equal to lying, if not worse. People are being generous by putting their knowledge on the internet to help people not to do it for people. Have courtesy and respect- don't copy peoples work use it as a guide and acknowledge them for their work and help. Plagerism- it's illegal so do the right thing.
  • ownloading illegally is one of the things not do in digital etiquette. Using file sharing programs such as KaZaA, Bit Torrent, iMesh, and Lime Wire to share or obtain copyrighted music, movies, games, and other software without the permission of the copyright holder is illegal. Stealing music has lots of effects once done. Some of the effects are listed below. Stealing music is against the law. Stealing music betrays the songwriters and recording artists who create it. Stealing music stifles the careers of new artists and up-and-coming bands. Stealing music threatens the livelihood of the thousands of working people—from recording engineers to Christian music retailers and their staffs —who are employed in this ministry.
  • Downloading Illegally
  • Some ways on avoiding stealing music are: Read user agreements carefully. Check the Web sites of the musicians, record companies, or movie studios to see if they allow distribution of their materials on the Internet. When purchasing music, movies, games, software, or other materials, read the license carefully to learn if you have permission to convert materials to other formats for personal use. Don't share or distribute materials unless you have permission. Of course, there are consequences to this kind of action. For one you can be fined of at least $500 dollars. The online infringement of copyrighted music can be punished by up to 3 years in prison and $250,000 in fines," the website said. "Repeat offenders can be imprisoned up to 6 years. Individuals also may be held civilly liable, regardless of whether the activity is for profit, for actual damages or lost profits, or for statutory damages up to $150,000 per infringed copyright. " To avoid these kinds of consequences you must avoid downloading illegally. I suggest that you follow the ways on avoiding these sort of consequences.
  • Some people have had both positively and negatively affected by internet etiquette. An example of negative etiquette on the internet is like if a person copies somebody's work without their permission and then the person who got copied goes and deletes that person's work
  • Don't type in all caps it looks like you're shouting which can offend some people which are on the other end of the computer because when you are talking to a person in face its easier to get your point across than talking online. Also if you try to do humor on the computer someone might not know that it is humor, and might take it as personal and you can get in trouble in all sorts of ways. Another thing is don't send rude messages or offensive e-mails to one another. It bad manners and it can get way out of hand in no time. Although you might be a pro at cyberspace be nice to the new comers. For a new comer on computers it is like learning a different language for them. Computers take a lot of practice and it is also called for mistakes. So be nice to everyone you meet and also try to help them if you can.
  • Another example is if you do something very funny and one of your friends got you on video tape and he goes and posts it on YouTube
  •  
    What etiquettet is
  •  
    "Digital Etiquette or netiquette is a basic set of rules you should follow to make the internet a better place for other people and yourself"
1More

Online Etiquette - 2 views

  • Respect others and their opinions. Your colleagues come from various backgrounds as they come together. It is important to respect their feelings and opinions though they may differ from Your own. Consider others’ privacy. Be wary of Your discussion topics and how private or open they may be. Keep in mind that all private messaging of any form is considered copyrighted by the original author. Pick the right tone. Since we depend on written communication in ESCnet, it is especially important to choose the right words to get Your meaning across. For example, sarcasm is harder to detect when you read the words rather than hearing them. Be forgiving. If someone states something that you find offensive, mention this directly to that person and notify our system administrators. Remember that the person contributing to the discussion might be new to this form of communication. Think before you hit the send button. Think carefully about the content of Your messages and posts before contributing them. Once sent to the group or the recipient, there is no taking it back. Grammar and spelling errors reflect on you, and Your audience might not be able to decode misspelled words or poorly constructed sentences. Brevity is best. Be as concise as possible when contributing anywhere in ESCnet. Your points might me missed if hidden in a flood of text. Stick to the point. Contributions to a discussion should stick to the subject deemed important by the group admin or discussion creator. Don’t waste others' time by going off on irrelevant tangents. Do not type in all caps. Typing in caps is considered shouting or screaming online. Various studies on the topic reflect that it is more difficult and takes longer to read text that is typed in all caps. Avoid frivolous email. Don’t forward jokes, "chain letters" or unimportant posts to colleagues in ESCnet without their permission. Not only does it fill up their screens, but it may offend people who do not share the same sense of humor.
1More

Safety Tips for Tweens and Teens - OnGuard Online - 0 views

  • Quick Facts While social networking sites can increase your circle of friends, they also can increase your exposure to people with less-than-friendly intentions. Here are some things you can do to socialize safely online: Think about how different sites work before deciding to join a site. Some sites allow only a defined community of users to access posted content; others allow anyone and everyone to view postings. Keep some control over the information you post by restricting access to your page. Keep your full name, Social Security number, address, phone number, and bank or credit card account numbers to yourself. Make sure your screen name doesn't say too much about you. Even if you think it makes you anonymous, it doesn't take a genius to combine clues to figure out who you are and where you can be found. Post only information that you are comfortable with others seeing and knowing. Consider not posting your photo. It can be altered or broadcast in ways you may not be happy about. Flirting with strangers online could have serious consequences. Some people lie about who they really are. Be wary if a new friend wants to meet you in person. If you decide to meet them, meet in a public place, during the day, with friends you trust. And tell a responsible adult where you're going. Trust your gut if you have suspicions. If you feel threatened by someone or uncomfortable because of something online, tell an adult you trust, and then report it to the police.
6More

Safety and Security on the Internet - 0 views

  • Why Should I Worry About Security? The Internet is a global collection of Interconnected Networks that facilitate information exchange and computer connectivity. The Internet is comprised of many different computers, all of which fall into two categories: servers (also known as "hosts") and clients (also known as "guests") -- technically, everything on the Internet can be considered a "host," but for this discussion, we'll use "hosts" and "guests." Guest machines send bursts of computer data called "packets" which are analyzed by the server belonging to the guest's Internet service provider. If the data is located locally (on the ISP's machine), the ISP's server will return the packets. If the information sought is not local (on another machine), the ISP's server hands off the packets to a router, which then sends the packets to the server containing the information. Once the information is located, it is sent back to the guest machine. There are many different types of computers that fill these two categories: mainframes, minicomputers, PCs, Macintosh, Unix and others. Despite the many varieties of computers that combine to form the Internet, every computer connected to the Internet needs to be able to communicate with every other computer -- without this ability, there is no Internet. All of these computers are able to communicate because in a sense they can all speak the same language -- TCP/IP. TCP/IP actually isn't a language; it is in computer terms what is known as a "protocol." A protocol is simply a standard for transmitting and receiving bits of information. As long as all of the interconnected computers follow the same protocol, they can exchange information. Unfortunately, when data is sent from one computer to another on the Internet, every other computer in between has an opportunity to see what's being sent. This poses an obvious security problem.
  • Say you decide to purchase concert tickets on the Web. To do so, you need to fill out an electronic form with your name, address and credit card number. When you submit the form, your information passes from computer to computer on its way to the concert ticket web server. It is possible that someone could be watching the data passing through one of the computers that is in between your computer and the concert ticket server. No one knows how often this happens, but everyone concedes it is technically possible. And its also possible off the web, too -- E-mail can be captured (and read, if not encrypted), as can file transfers via unsecure FTP. If someone wanted to, it wouldn't be too difficult to connect a capture device to someone's phone line (assuming they use a modem to connect to the Internet) and steal an electronic copy of the data exchanged on the Internet. Even if you make your purchase on a secure web site supporting the latest security features, it has been recently shown that secure sites can cause Internet Explorer (and other browsers) to send sensitive information to a non-secure server in plain text format.
  • The point is, there are a lot of security issues related to a network such as the Internet. No FAQ could possibly cover them all. That is why this FAQ concentrates on Internet Explorer. Because there are millions of people who use Microsoft Windows family products, and because those millions have the ability to blend Internet Explorer with these products, the seriousness about security should be of paramount importance to everyone. Remember,  software products are only as secure as the environment in which they operate.
  • ...2 more annotations...
  • What Security Features does Internet Explorer Have? Internet Explorer is a safe browser in many ways. The latest version of IE supports Secure Socket Layer (SSL) 2.0/3.0, Private Communication Technology (PCT) 1.0, CryptoAPI, and VeriSign certificates, and one version employs 128-bit encryption, one of the strongest forms of encryption that's commercially available for use over the Internet. To see if you have the 128-bit version of Internet Explorer, go to the Wells Fargo Bank site and take their browser test. "Secure Socket Layer (SSL) is a Netscape-developed protocol submitted to the W3C working group on security for consideration as a standard security approach for World Wide Web browsers and servers on the Internet. SSL provides a security "handshake" that is used to initiate the TCP/IP connection. This handshake results in the client and server agreeing on the level of security they will use and fulfills any authentication requirements for the connection. Thereafter, SSL's only role is to encrypt and decrypt the byte stream of the application protocol being used (for example, HTTP). This means that all the information in both the HTTP request and the HTTP response are fully encrypted, including the URL the client is requesting, any submitted form contents (such as credit card numbers), any HTTP access authorization information (usernames and passwords), and all the data returned from the server to the client." -- Microsoft's IIS 1.0 Features Tour. It has been reported, however, that SSL has been cracked. Private Communication Technology (PCT) is a Microsoft-developed security protocol available in IE only. According to their Internet draft, "The Private Communication Technology (PCT) protocol is designed to provide privacy between two communicating applications (a client and a server), and to authenticate the server and (optionally) the client. PCT assumes a reliable transport protocol (e.g., TCP) for data transmission and reception. The PCT protocol is application protocol-independent. A "higher level" application protocol (e.g., HTTP, FTP, TELNET, etc.) can layer on top of the PCT protocol transparently. The PCT protocol begins with a handshake phase that negotiates an encryption algorithm and (symmetric) session key as well as authenticating a server to the client (and, optionally, vice versa), based on certified asymmetric public keys. Once transmission of application protocol data begins, all data is encrypted using the session key negotiated during the handshake." IE also supports server and client authentication by using digital certificates to identify users to web servers. In addition, IE supports code signing with Authenticode, which verifies that downloaded code has not been modified. For more information on Authenticode, visit Microsoft's Authenticode page or the excellent Authenticode FAQ page. CryptoAPI 1.0 provides the underlying security services for the Microsoft Internet Security Framework. CryptoAPI allows developers to integrate cryptography into their applications. Microsoft has given a great deal of thought to the issue of security and it products, and Internet Explorer 4.0 is no exception. From "Security Zones" to continued support and refinement of Authenticode, IE4 promises to be one of the safest browsers of all time.  You can read all about the security available in IE 4 at http://www.microsoft.com/ie/ie40/?/ie/ie40/features/ie-security.htm. Also, check out what Microsoft is doing to keep transactions private with IE 4.
  • What are "Cookies?" Cookies are small text files that are sent to web browsers by web servers.  The main purpose of cookie files are to identify users and to present customized information based on personal preferences.  Cookie files typically contain information such as your name (or username), password information, or ad-tracking information.  There is a good body of literature on  the Internet about cookies.  Despite what you may have read or heard, most people, including myself, do not view cookies as any kind of a security threat.  However, because of the way cookies work (e.g., a web server storing a text file on someone's hard drive), Microsoft (and other browser manufacturers) have built options into their browsers that notify users when cookies are being passed to them, and give the user an option to prevent the cookie from being accepted.  I don't think this is a good idea.  By rejecting cookies, your browser may not display the entire page or the site may not function as intended. The reality is that cookies are text files -- they cannot contain viruses or execute applications, they cannot search your hard drive for information or send it to web servers, and most of the information they contain is simple tracking information designed to effect better customer service.
  •  
    safe things to do on the Internet and what to learn that is big
12More

BBB offers parents tips to keep children safe while online | Wichita Eagle - 1 views

  • * Set privacy options.
  • * Explain to your children that they can't take back what they've written.
  • * Know who is looking at your profile
  • ...8 more annotations...
  • * Don't "friend" everyone
  • Don't let your child's profiles on social websites be available to everyone. Explain to your child why it's important to have the highest security and privacy settings. Parents should monitor their children's use of the computer while they're on the Internet.
  • Children and teens should think about who will be looking at their profile. Many people will be able to see their page, including parents, teachers, coaches, the police and the college or the job they might want to apply for in the next few years. They should post only the information they are comfortable with others seeing about them.
  • Merely deleting a post doesn't mean it's not still available for others to see in cyberspace. It is important for children and teens to know that once you press the "send" or "post" button, there is no going back. Think about keeping some control over the information you post. Consider restricting access to your page to a select group of people — for example, your friends or your family.
  • Unfortunately there are dangerous people who may be creeping
  • * Don't divulge too much information.
  • Now that school has started children and teens are spending more time online doing school work, research, and socializing. As soon as a child starts using the computer and Internet, it's time to talk with them about online behavior, safety and security. Parents need to know what to do to ensure their child is safe online, in texting, blogging, Facebook and visiting other Internet sites.
  • Better Business Bureau
  •  
    This website talks about how parents can make sure their children are safe online.
8More

A Parents Guide to Cyberbullying - 0 views

  • Cyberbullying is threatening, lying about, stalking or otherwise harassing a person online or via other electronic communication devices like a cell phone
  • How to Prevent Your Child from Being Victimized
  • Be your child’s support system
  • ...4 more annotations...
  • Be firm.
  • Know your child
  • Know the danger signs.
  • Educate
  •  
    CYBERBULLY Many parent do not what to do in case of cyberbullying. The more prepared they are, the more likely they are to save their child from cyberbullying. "Be your child's support system. Be firm. Know your child. Know the danger signs. Educate."
2More

Video Game Addiction - Internet Gaming Addiction - 0 views

  • In this digital age, bullying is no longer relegated to the schoolyard. Bullies can now attack in the place kids should feel the safest -- their homes. Instead of physically harming or verbally attacking their victims, cyberbullies use the Internet, cell phones and other technology to hurt, threaten and embarrass others. Because it is done online, the effect of cyberbullying is more far-reaching and enduring than bullying that occurs at school. Cyberbullies can victimize their targets in a variety of ways, including the following: Creating websites that make fun of or criticize another person Sending mean or threatening emails, instant messages or text messages Pretending to be someone else to trick their victim into revealing personal information Lying about their victim online Breaking into their victim's email or instant messages Posting unflattering or offensive pictures online, without permission Using websites to rate their peers In most instances, the victims of cyberbullying know their attackers. They are often classmates, friends or online acquaintances. One study showed that only 23 percent of victims were bullied by someone they didn't know.
  •  
    You need to keep your private information private and not public. this is what causes Cyberbulling and to prevent it, you need to keep your personal life and activities private. "In this digital age, bullying is no longer relegated to the schoolyard. Bullies can now attack in the place kids should feel the safest -- their homes. Instead of physically harming or verbally attacking their victims, cyberbullies use the Internet, cell phones and other technology to hurt, threaten and embarrass others. Because it is done online, the effect of cyberbullying is more far-reaching and enduring than bullying that occurs at school. Cyberbullies can victimize their targets in a variety of ways, including the following: Creating websites that make fun of or criticize another person Sending mean or threatening emails, instant messages or text messages Pretending to be someone else to trick their victim into revealing personal information Lying about their victim online Breaking into their victim's email or instant messages Posting unflattering or offensive pictures online, without permission Using websites to rate their peers In most instances, the victims of cyberbullying know their attackers. They are often classmates, friends or online acquaintances. One study showed that only 23 percent of victims were bullied by someone they didn't know."
2More

5 Ways to Stay Safe Online | ClickID Blog - 0 views

  • 3. Be Careful with Email Emails are a common source of spam and phishing scams. Avoid opening suspicious emails or clicking questionable links (within emails or without). Even if an email contains a link to a seemingly trustworthy site that you frequent (like your email provider or bank), it is always a good idea to avoid the link and point your browser to the site manually. This can avoid phishing scams. Additionally, simply loading the pictures in a spam message can send information back to its creator notifying them that your email address is an active target. So utilize your email’s spam filter to avoid infected emails from ever loading.
  •  
    One way to protect yourself is by being careful on your email. It is common for phishing scams and spam.
2More

Internet Addiction & Health Effects | LIVESTRONG.COM - 0 views

  • Anna Cocke graduated from CUNY with a Master of Arts in Journalism, specializing in health and medicine reporting. She has helped produce segments for the Association of Health Care Journalists on health care reform and reported on diabetes in the South Bronx. She has been writing professionally for more than seven years. Photo Credit computer image by blaine stiger from Fotolia.com The Internet has become an integral part of many people's work and personal lives. The number of people online daily has nearly doubled over the past decade, according to research conducted by the Pew Internet and American Life Project. While internet addiction as a specific disorder was being debated for inclusion in the American Psychiatric Association's Diagnostic and Statistical Manual of Mental Disorders as of 2010, treatment centers already exist throughout the U.S. and abroad, including China, Taiwan and Korea. Physical Effects Internet overuse can lead to sedentary lifestyles, weight gain and a decline in physical fitness. Other symptoms can include carpal tunnel syndrome, dry eyes, migraine headaches, a decline in personal hygiene and back aches, according to Maressa Hecht, founder of Computer Addiction Services and a member of the Harvard Medical School. if(typeof disable_adsense_2 === "undefined") { ad_order_2 = (typeof ad_order_2 === "undefined") ? "2" : ad_order_2; ad_client = "ca-livestrong_html"; num_ads = "1"; type = "text"; channels = "art_sub_top_Addiction_Recovery,article_top_diseases,article_top"; class_name = "adsense_afc"; print_google_ad(ad_order_2, num_ads, type, channels, ad_client , class_name ); } Sponsored LinksHow to Stay Asleep Obey this one weird trick to stay asleep all night long. Learn more. www.PeakLife.com/TrySomnapure Depression Depression has also been linked to Internet overuse by researchers at the Institute of Psychological Sciences in Leeds, UK. Researchers found that study participants who exhibited signs of Internet overuse engaged disproportionately than the normal population in sites devoted to pornography, gaming, social networking and chat rooms. They theorized that Internet addicts' use of these sites as replacements for real-life socializing was resulting in depression. However, there is debate as to whether depression results from, or is a cause, or internet overuse. A study published in the "Archives of Pediatrics and Adolescent Medicine" found depression, as well as ADHD and social phobia, to increase the chances of excessive Internet use in adolescents. Sleep Disturbances Evidence also suggests that internet overuse can contribute to sleep disturbances. Studies of Chinese and American children, published in the "Journal of Sleep" and the "Journal of the American Academy of Pediatrics," found that computer use among adolescents was associated with later bed times, later waking times, less restful sleep and an overall decrease in sleep. The use of computers before bedtime has also raised concerns among sleep experts, including Phyllis Zee, a neuroscience professor at Northwestern University, that the light from screens is affecting circadian rhythms and possibly contributing to insomnia.
  •  
    Addiction can be very harmful to your life. You do not to be addicted to anything. Keep your health up and your body healthy. " Photo Credit computer image by blaine stiger from Fotolia.com The Internet has become an integral part of many people's work and personal lives. The number of people online daily has nearly doubled over the past decade, according to research conducted by the Pew Internet and American Life Project. While internet addiction as a specific disorder was being debated for inclusion in the American Psychiatric Association's Diagnostic and Statistical Manual of Mental Disorders as of 2010, treatment centers already exist throughout the U.S. and abroad, including China, Taiwan and Korea. Physical Effects Internet overuse can lead to sedentary lifestyles, weight gain and a decline in physical fitness. Other symptoms can include carpal tunnel syndrome, dry eyes, migraine headaches, a decline in personal hygiene and back aches, according to Maressa Hecht, founder of Computer Addiction Services and a member of the Harvard Medical School. Sponsored Links How to Stay Asleep Obey this one weird trick to stay asleep all night long. Learn more. www.PeakLife.com/TrySomnapure Depression Depression has also been linked to Internet overuse by researchers at the Institute of Psychological Sciences in Leeds, UK. Researchers found that study participants who exhibited signs of Internet overuse engaged disproportionately than the normal population in sites devoted to pornography, gaming, social networking and chat rooms. They theorized that Internet addicts' use of these sites as replacements for real-life socializing was resulting in depression. However, there is debate as to whether depression results from, or is a cause, or internet overuse. A study published in the "Archives of Pediatrics and Adolescent Medicine" found depression, as well as ADHD and social phobia, to increase the chances of excessive Internet use in adolescents. Sleep Disturbances Evidenc
2More

Facebook Increasingly Becomes a Helpful Tool for Employers in Job Interviews | Moneylan... - 0 views

  • Privacy advocates say that, for now, it is legal for a prospective employer, during a job interview, to insist that you log into your Facebook page and then click through your “friends only” posts, photos and messages. The ACLU put a stop to companies demanding that applicants turn over their login and password credentials, but “shoulder surfing,” as it’s been dubbed, is legal for the time being. Aleecia M. McDonald, a privacy researcher and resident Fellow at the Stanford Center for Internet and Society, says high unemployment makes it hard to stamp out this practice. “When you have a job market where there are more job seekers than hirers, you’re going to see things like demanding to see your Facebook wall because if you say no, someone else is waiting for that interview.”
  •  
    This article talks about interviewers insisting on "shoulder surfing" your Facebook page and whether this should be allowed.
1More

Digital Literacy Resource - Privacy and the Internet - 0 views

  •  
    You should always think about what you are going to post before you do it.  "It's your profile, you can include what you want to include-right? Before you post, think. Are you prepared to have those words and images represent you for months, and even years to come? your postings on profiles and to chats and blogs may have cyberlives much longer than what you might have imagined or intended, and may reach a much wider audience than you could have anticipated. This simple fact is illustrated in the following examples from around the country: Students who posted party photos online later found that those photos were used by their university's administration when it needed to make a case regarding alcohol abuse among minors. A student's application for a position as a resident advisor was rejected by university staff who reviewed the applicant's Facebook page and found the material there to be inappropriate. A graduate's job application was rejected when the hiring organization deemed objectionable some of the content he had posted online. Students were reprimanded for extreme and possibly libelous statements they made about a professor in Facebook postings. Are your online postings private? No, not at all. Many postings can and will be viewed by hiring committees, admissions personnel, marketing agencies, and other unintended audiences. Privacy is a complicated matter in American law, evoking everything from Fourth Amendment rights to civil rights. Explore the following topics to learn more about the ins and outs of privacy in the online environment."
1More

Online Safety Tips | Protect Kids and Family Online | Microsoft Security - 2 views

  •  
    This website has tips to stay safe online and protect your privacy. Tips include defending your computer, protecting sensitive personal information, creating strong passwords and keeping them secret, taking charge of your online safety and reputation, use social networks more safely, and talking to kids about staying safer online.
2More

6 Reasons Why You Should Secure Your Unsecured Wi-Fi Wireless Network, What Can Happen ... - 4 views

  •  
    This is an article with a few reasons why you should secure your wireless internet connection. It also gives a few ways to go about securing your network. 
  •  
    Flag This Hub Two Major Vulnerabilities If you have a Wi-Fi network, you should not let every people off the street use it. That can cause a LOT of problems. Why? Anyone using your connection appear as your IP address online. That's right...
2More

Internet and Computer Addiction: Signs, Symptoms, and Treatment - 1 views

  • Each person’s Internet use is different. You might need to use the Internet extensively for your work, for example, or you might rely heavily on social networking sites to keep in touch with faraway family and friends. Spending a lot of time online only becomes a problem when it absorbs too much of your time, causing you to neglect your relationships, your work, school, or other important things in your life. If you keep repeating compulsive Internet behavior despite the negative consequences in your offline life, then it’s time to strike a new balance
  •  
    social awareness health -habbits of managing online activity
1More

Pageflakes - Sandy's Literacy Blogs - 1 views

  •  
    40 literacy blogs aggregated on one pageflake. This is a great example of the building of customized PLN's to help others understand the purpose of a PLN. If you're a librarian or working with literacy -- why not set this to be your start page - even for just a few days to see what happens. Or, even better - use your favorite rss reader and construct your own Personal learning network using many of these blogs.
« First ‹ Previous 41 - 60 of 321 Next › Last »
Showing 20 items per page